نتایج جستجو برای: pervasive computing

تعداد نتایج: 444430  

Journal: :Advances in Computers 2008
Mark Wenstrom Eloisa Bentivegna Ali R. Hurson

This chapter will survey pervasive computing with a look at how its constraint for transparency affects issues of resource management and security. The goal of pervasive computing is to render computing transparent, such that computing resources are ubiquitously offered to the user and services are proactively performed for a user without his or her intervention. The task of integrating computi...

2007
YANG Fan PU Fang CAO Qi-ying LI Tong Mark Weiser

Pervasive computing world implies privacy, particularly the bad publicity around invasions of privacy, could block the incredible potential of pervasive computing. A brief introduction of the understanding of privacy, and how they relate to the world of pervasive computing are provided in this paper. With the pseudonyms and Bit Commitment techniques, a Security Protocol— SPEP is designed and bu...

Journal: :IEEE Pervasive Computing 2005
Roy Want Keith I. Farkas Chandrasekhar Narayanaswami

P ervasive computing aims to integrate computation into our daily work practice to enhance our activities without being noticed. In other words, computing becomes truly invisible. Yet at the heart of every pervasive computing system are electronic components that consume energy. Managing the energy needs of mobile systems, or systems for which reliable power isn’t guaranteed, can be a significa...

2016
Emerson Loureiro Glauber Ferreira Hyggo Almeida Angelo Perkusich

In this chapter, we introduce the key ideas related to the paradigm of pervasive computing. We discuss its concepts, challenges, and current solutions by dividing it into four research areas. Such division is how we were able to understand what really is involved in pervasive computing at different levels. Our intent is to provide readers with introductory theoretical support in the selected re...

2017
Nilmini Wickramasinghe N. Wickramasinghe

A confluence of developments has led to the possibility of realizing a vision of pervasive healthcare. These include, but are not limited to, society becoming increasingly mobile, dramatic advances in various areas of technology and computer science, exponentially increasing healthcare costs coupled with workforce issues, the need to provide effective and efficient healthcare, and the change in...

2003
Sadie Creese Michael Goldsmith A. W. Roscoe Irfan Zakiuddin

Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our vie...

2003
Jesus Favela Ana I. Martinez-Garcia Christian Navarro

The proliferation of different computing devices such as handhelds and wall-size whiteboards, as well as Internet-based distributed information systems are creating ubiquitous computing environments that provide constant access to information regardless of the user's location. Slowly, this technology is entering the home environment. In this paper we explore the uses of pervasive computer techn...

2002
Roberto Speicys Cardoso Fabio Kon

The recent evolution of small-sized electronic devices and their growing computational power turned the concept of pervasive computing into a reality not very distant in the future. Researchers are currently developing systems to provide the basic software infrastructure needed for next generation pervasive computing environments. In these systems, however, the possibilities offered by the use ...

2009
Alois Ferscha Clemens Holzmann Manfred Hechinger Bernadette Emsenhuber Stefan Resmerita Simon Vogl Bernhard Wally

Pervasive Computing has developed a vision where the " computer " is no longer associated with the concept of a single device or a network of devices, but rather the entirety of situative services originating in a digital world, which are perceived through the physical world. It is expected that services with explicit user input and output will be replaced by a computing landscape sensing the p...

2006
Jim Parker Anand Patwardhan Filip Perich Anupam Joshi Timothy W. Finin

Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-pe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید